Analysis

  • max time kernel
    91s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    30-06-2022 19:56

General

  • Target

    d60931ac230ffd0dca4f8e372fb3c82716a3f71fe7c199b4c6a517aafc55305e.exe

  • Size

    10.2MB

  • MD5

    f29a86fa16fc8c55acbfabe4fb388743

  • SHA1

    e0e74d9f4454df636fd2fec10561af4fd5412353

  • SHA256

    d60931ac230ffd0dca4f8e372fb3c82716a3f71fe7c199b4c6a517aafc55305e

  • SHA512

    8e419c8ab1586151fa174e65e2b2505a499ab24a303a655d900619ebaaa24528f058409e04961b6bde2d8c131155f28c3d885fe46a148726467408475b806ebb

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • XMRig Miner Payload 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d60931ac230ffd0dca4f8e372fb3c82716a3f71fe7c199b4c6a517aafc55305e.exe
    "C:\Users\Admin\AppData\Local\Temp\d60931ac230ffd0dca4f8e372fb3c82716a3f71fe7c199b4c6a517aafc55305e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of AdjustPrivilegeToken
    PID:4588

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4588-130-0x00007FF7E9230000-0x00007FF7E9F85000-memory.dmp
    Filesize

    13.3MB

  • memory/4588-131-0x000001F8B82E0000-0x000001F8B8300000-memory.dmp
    Filesize

    128KB

  • memory/4588-132-0x000001F8B8310000-0x000001F8B8330000-memory.dmp
    Filesize

    128KB

  • memory/4588-133-0x000001F8B9BD0000-0x000001F8B9BF0000-memory.dmp
    Filesize

    128KB

  • memory/4588-134-0x000001F8B9BF0000-0x000001F8B9C10000-memory.dmp
    Filesize

    128KB

  • memory/4588-135-0x000001F8B9BD0000-0x000001F8B9BF0000-memory.dmp
    Filesize

    128KB

  • memory/4588-136-0x000001F8B9BF0000-0x000001F8B9C10000-memory.dmp
    Filesize

    128KB